ArticlePDF Available

Predicting the Risk of Cardiovascular Diseases using Machine Learning Techniques

Authors:
  • St. Andrews Institute of Technology & Management Gurugram

Abstract

These days, health-related diseases are increasing day by day due to lifestyle and genetics. Especially these days, heart disease is so common that people's lives are at risk. Blood pressure, cholesterol and pulse rate vary from person to person. However, according to proven clinical results, normal blood pressure is 90/120 and cholesterol is 129-100 mg/dL, Pulse 72, fasting blood glucose 100 mg/dL, heart rate 100-60 bpm, normal ECG, main vessel width 25 mm (1 inch) in the aorta only 8 μm in the capillaries. This article looks at the different classification techniques used to predict each person's risk level based on age and gender. Blood pressure, cholesterol, heart rate. A "disease prediction" system based on predictive modeling predicts a user's disease based on the symptoms the user enters into the system. The system analyzes the symptoms that the user provides as inputs and provides disease probabilities as outputs. Disease prediction is done by applying techniques like KNN, Decision tree classifiers, random forest algorithms, and more. This technique calculates the probability of a disease. Therefore, we obtain an average prediction accuracy probability of 86.48%.
International Journal of Intelligent Systems and Applications in Engineering
IJISAE, 2023, 11(2s), 165173 | 165
International Journal of
INTELLIGENT SYSTEMS AND APPLICATIONS IN
ENGINEERING
ISSN:2147-6799 www.ijisae.org Original Research Paper
Predicting the Risk of Cardiovascular Diseases using Machine Learning
Techniques
Puneet Garg1, Neetu Sharma2, Sonal3, Bharati Shukla4
Submitted: 22/10/2022 Accepted: 24/01/2023
Abstract: These days, health-related diseases are increasing day by day due to lifestyle and genetics. Especially these days, heart
disease is so common that people's lives are at risk. Blood pressure, cholesterol and pulse rate vary from person to person.
However, according to proven clinical results, normal blood pressure is 90/120 and cholesterol is 129-100 mg/dL, Pulse 72, fasting blood
glucose 100 mg/dL, heart rate 100-60 bpm, normal ECG, main vessel width 25 mm (1 inch) in the aorta only 8 μm in the capillaries.
This article looks at the different classification techniques used to predict each person's risk level based on age and gender. Blood
pressure, cholesterol, heart rate. A "disease prediction" system based on predictive modeling predicts a user's disease based
on the symptoms the user enters into the system. The system analyzes the symptoms that the
user provides as inputs and provides disease probabilities as outputs. Disease prediction is done by applying techniques like KNN,
Decision tree classifiers, random forest algorithms, and more. This technique calculates the probability of a disease. Therefore, we obtain
an average prediction accuracy probability of 86.48%.
Keywords: Coronary ailment, Heart disease, ECG, Data mining, Respiratory disappointments
1. Introduction
In regular daily existence there are various parts that
impact the core of individual viable. Various issues are
going on at a disturbing velocity and new heart
contaminations are immediately perceived. Heart is the
fundamental blood pumping organ; it is responsible for
circulating blood in the entire body and its smooth
functioning is very important for a person’s survival. A
person’s health especially heart health is widely
dependent on a person’s lifestyle, his behavior and
profession. Heart disease is dependent on a genetic factor
of a person, that is his genetic makeup which he has
acquired from his ancestors. There are various Genetic
factors which are passed from generations through which
various types of heart diseases are passed on. According
to the World Health organization’s study all over the
world more than 13.99 million deaths are occurring and
the cause of death in these cases is identified as
cardiovascular diseases, these diseases affect the arteries
of a heart and thus affect the circulating power of a heart.
Younger generations in their twenties are also being
affected due to cardiovascular diseases. Lifestyle of a
person affects the possibility of being affected by heart
diseases, obesity is such a cause, eating junk food makes
a person obese and increases possibility of heart disease.
Poor diet, not consuming a balanced diet also leads to
heart disease [20,21]. High blood pressure also leads to
heart diseases. Smoking is injurious to health in every
aspect and it leads to heart disease as well [27,28,29,30].
Below figure 1. Describe how smoking is affected on
human heart and which type of problem human have
been faced.
1Assistant Professor, ABES Engineering College, Ghaziabad,
U.P., India
2 Professor, Galgotias University, Greater Noida, U.P., India
3Associate Professor, Department of CSE, BPSMV, Khanpur
kalan, Distt. Sonipat, Haryana, India
4Assistant Professor, ABES Engineering College, Ghaziabad,
U.P., India
puneetgarg.er@gmail.com1,neetush75@gmail.com2,
sonalkharb@gmail.com3, bharati.shukla@abes.ac.in4
International Journal of Intelligent Systems and Applications in Engineering
IJISAE, 2023, 11(2s), 165173 | 166
Fig. 1. Smoking effects on heart
After being affected by a heart disease, there should be a
proper mechanism for diagnosing the disease especially
the heart disease, it’s the most complicated task in the
health care system. Various factors are taken into
analysis while predicting the nature of a diseases in our
case heart diseases, above mentioned lifestyle factors and
others habits are taken into consideration. While
performing checkup of a patient, doctor in charge tries to
figure out all the factors. The symptoms of coronary
ailment exceptionally depend on which of the misery felt
by a man. A couple of reactions are not commonly
recognized by the standard residents. Nevertheless,
ordinary signs join chest torment, brevity of breath, and
heart palpitations. The chest torment fundamental to
various sorts of coronary sickness is known as coronary
thrombosis and generally takes place due to shortage of
oxygen in the body. Severe chest pain may be actuated
by disagreeable exercise and consistently suffers under
5-15 minutes [38,39]. Respiratory disappointments can
in like manner happen Coronary ailment Figure using
simulated intelligence Figuring’s in view of different
sorts of coronary sickness. The signs of a cardiovascular
disappointment take after chest discomfort. The signs of
a coronary disappointment can a portion of the time take
after indigestion. Indigestion and gastrointestinal
discomfort is a possible symptom. Diverse indicator of a
respiratory disappointment fuse torment that develops in
a person, it appears as a pain in firearms, cervix, midriff ,
belly, or mandible, deliriousness what's increasingly,
woozy sensations, copious sweating, infection and
heaving.
Fig. 2. Cardiovascular System
Figure 2. represent the parts of Cardiovascular system.
The Cardiovascular breakdown [10,11] is moreover an
aftereffect of coronary ailment, and windedness can
happen when the heart ends up being too weak to even
consider evening consider circling blood. Some heart
conditions occur with no reactions using any and all
means, especially in increasingly in persons with a
history of polygenic disorder. Heart diseases present
from birth have some general characteristics such as high
perspiration levels, lethargy, rapid heartbeat and
abnormal breathing[46,47]. In these circumstances, the
investigation transforms into astounding undertaking
with an unimaginable acquaintance with inclination. A
respiratory[44] disappointment or the possibility of the
cardiovascular problem at whatever point separated
early, can empower the patients to avoid any and all risks
and take managerial measures. Starting late, the human
administrations industry has been making tremendous
International Journal of Intelligent Systems and Applications in Engineering
IJISAE, 2023, 11(2s), 165173 | 167
proportions of record of information of people affected
or contamination discovering reports are all things
considered especially taken for the desire ambushes far
and wide. Right when the data about coronary sickness is
enormous, the man-made intelligence systems can be
executed for the assessment. In this investigation work,
the managed computer knowledge is taken into
consideration for getting accurate results for analysis and
predicting things in advance [41,42][45]. The knowledge
is not visible to everyone and can be used only by
utilizing proper data mining tools. Thus, there arose need
for classifying data mining into various types through
which successful results may be obtained which can be
utilized in medical field. Thus, gave birth to medical data
mining which combined various techniques and gave
computer-based schooling to the provided input or we
can say datasets thus leading to possible exploring of
various hidden systems in the medical data mining which
predicted the patients’ symptoms. Thus, by making use
of medical data mining we can generate accurate results
for focusing on the cause of illness and predicting actual
disease. Medical data mining is utilizing various
flowcharts and algorithms to provide justice to the
investigation. We can make use of various algorithms to
determine the type of heart disease social protection is a
field of the most required assistance and a monetarily
2ndlargest industry in 21stcentury. While we talk about
the sensibility and quality insistence in human
administrations industry, a couple of quantifiable
examinations are kept making prosperity game plans
logically precise and impeccable in this rhythmic
movement time of extending clinical issues and
consistent diseases. Types of progress on data driven
insightful headways is contamination finding and
acknowledgment, treatment and research are striking.
Clinical picture assessment, reaction based
contamination desire is the place the most searched for
after brains are working [22,23,24]. In this paper we
intend to present our proposed model on the gauge on
finish of cardio vascular infirmity with ECG assessment
and sign based distinguishing proof. The model hopes to
be investigated and advance in further to get solid and
from beginning to end reliable research instrument. We
will look at about the customary procedures and
computations completed on CVD conjecture, dynamic
degrees of progress, draw assessment of execution
among the present structures and propose a redesigned
multi-module system performing better similar to
accuracy and plausibility. Utilization, getting ready and
testing of the modules have been done on datasets
procured from UCI and Physio net data stores. Data
position have been adjusted if there ought to emerge an
event of the ECG[26] report data for development of
movement by the convolutional neural framework used
in our investigation and in the peril figure module, we
have picked properties for getting ready and executing
the multi-layered neural framework made by
us[36,37,38,][4].
The structure of remining paper is as follow: Section II
describe the detail literature part of cardiovascular
system. Section III discussed the problem statement of
research paper and the datasets which are required to
implement problem statement are discussed in Section
IV. Result of research paper are discussed in Section V
and conclusion of our paper are discussed in Section VI.
2. Literature Review
As per Shantakumari, et al. [1] have achieved an
assessment work in which the adroit and sensible
cardiovascular disappointment figure structure is made
using Multi-Layer Perceptron with Back-Duplication. In
like way, the intermittent events of the coronary
suffering are assembled with the MAFI A estimation
subject to the values evacuated.
Yanweeii, et.al [2] ,Yadav. et.al [25] have accumulated a
social event framework reliant on the reason behind
parametric specifications by researching HRV (Heartbeat
Changeability) from electrocardiogram and the data is
earlier managed with coronary ailment surmise model is
made that coordinates the coronary issue of a sick
person. A couple of data mining methods are used in the
assurance of coronary sickness, for instance, Guiltless
Bayes, Decision Tree, neural framework, partition
thickness, sacking computation, and reinforce vector
machine exhibiting different degrees of exactnesses.
Blameless Bayes is amongst the compelling portrayal
frameworks used in the assurance of coronary sickness
patients.
Die doownn et al. [3] discussed about another part of
decision method count which is the cream methodology
which merged Bayes speculation and surveyed estimated
accuracy 85.5559%. Regardless of the way that these are
commonly used artificial intelligence computations, the
coronary disease gauge is an essential task including
most vital possible exactness. Accordingly, the three
figurings are checked at different stages and sort to
appraisal philosophies.
Karayilan et al.[5] and Mardiyono et al.[6] discussed a
brief about clinical experts in developing an unrivaled
appreciation and help them with recognizing a response
for perceive the best technique for foreseeing the heart
diseases.
Guru et al.[7] and Singh et al.[8] developed a key test
confronting social protection affiliation (crisis facilities,
clinical centers) is the workplace of significant worth
organizations at reasonable expenses. Quality solaces
International Journal of Intelligent Systems and Applications in Engineering
IJISAE, 2023, 11(2s), 165173 | 168
propose detecting sickness exactly and preventing
prescriptions that are practical. Inadequate clinical
choices can impel disastrous results, that are as such
unacceptable. Crisis centers ought to compel the
expenses on performing these clinical tests. This can be
achieved by utilizing fitting PC type of data and in
addition choice really solid frameworks.
Asha et al. [9] studied on the function of the heart isn’t
genuine, it will have a direct imapct on working of other
body parts, for example, cerebrum, nephrons, and so on.
Coronary sickness is a tribulation which ramifications
for the development of the heart.
Nasira et al. [10] and other researchers [11][35]
discussed a wide accessibility of champion extent of
information and a need to change over this open epic
extent of information to steady data requires the
utilization of information mining philosophies.
Information Mining and KDD (learning disclosure in the
database) have wound up being prominent as of late.
Daniel et al. [12] discussed on the omnipresence of
information mining and KDD approach (information
divulgence in database). It shouldn't be a marvel since
the extent of the information constructs that are
accessible are incredibly wide to be dismembered truly
and even the techniques for redid information assessment
considering set up bits of information and machine
modifying a great part of the time bargain issues while
arranging immense, amazing information grows
including complex things.
Kumari et al. [13] discussed on information Mining
approach and it is the feature of Data Exposure Database
(KDD). There are sure periods of information mining
that you ought to get settled with, and these are
examination, plan recognizing evidence, and course of
action. Information mining is an iterative technique that
by and large consolidates the going with stage.
Mehta et al. [14] and X et al.[15] discussed the
associations of disarranges and the certified purposes
behind the messes and the effects of reactions that are
abruptly found in patients can be surveyed by the
customers by methods for the manufactured
programming with no issue.
Jankowski et al.[16] and other researchers [17,18] does
accurate examination has recognized the disperses of the
heart and veins, and joins coronary sickness (respiratory
disappointments), cerebrovascular contamination
(stroke), raised circulatory strain (hypertension),
periphery course disease, rheumatic coronary ailment,
inherent coronary ailment and cardiovascular
breakdown. The critical explanations behind
cardiovascular disease are tobacco use, physical
inertness, an awful eating daily schedule and frightful
using ethanol. The three huge purposes behind heart
sickness are distress, brain damage and coronary
disappointment.
Singh et al. [19] implemented a K-suggests approach and
the knowledge extraction methodologies like fake neural
methodology utilized in amazing coronary
disappointment desire figure of heart contaminations was
pre-arranged and assembled by strategies for K-suggests
packing count. By then neural framework is set up with
the picked basic models.
3. Problem Definition
Huge increase in number of patients with heart diseases
has been pointed out and this is as a result of our eating
food and then moving back to workplace without doing
any physical exercise. Our inactive lifestyle is largely
responsible for this increase. Technology has played a
vital role for this change in our behaviour with the
availability of cell phones people prefer to utilize their
leisure time watching movies, playing games or various
our inactive recreational activities. Our generation is too
lethargic to take a walk, or do some kind of
meditation[31,32,33,34] . This inactive lifestyle has led
to an unfortunate increase in number of heart related
sickness. India being a developingcountry people mostly
perform 9-5 kind of jobs which is an inactive lifestyle
and thus it has the same effect on increase in
Cardiovascular illness. People nowadays use their own
transport even for shorter distances, For buying vegies
people prefer to use their car or other transport available
rather than waking some distances. The death rate per
200,000 people from Heart [40][43][45].
In this research paper, 3 algorithms is used and have
formulated a model to get accurate results in predicting
the heart diseases present in an individual. The dataset is
used from UCI repository.
3.1.
Dataset, Dataset Structure & Description
To make our research realistic we have taken datasets
from Cardiology Institute from Hungary university. We
have used dataset from UCI repository.
3.1.1
Different Stages of datasets involved for
reached our proposed approach
The Figure 3. Represent overall stages required to
reached our problem objective i.e. to calculate accuracy
of different classification of machine learning techniques
used for predicting the risk level of each person based on
age, gender, Blood pressure, cholesterol, pulse rate.
International Journal of Intelligent Systems and Applications in Engineering
IJISAE, 2023, 11(2s), 165173 | 169
Fig. 3. Stages of datasets
3.1.2. Initialization of datasets to achieved problem
statement are as follow
Stage 1: Import Libraries
First, declare java libraries for comparing the
classification algorithm. Figure 4 represent the java
libraries which are used to defined datasets. For
comparison and analysis of classification algorithm the
proposed approach used Cardiology datasets.
Fig. 4: Import libraries
Stage 2: LOAD The Data
After initialize or declare the library, now second step is
importing the data file. Below figure 5. represent the
syntax which are used for initialized the data file. The
datasets are taken from Cardiology Institute for analysis
the classification algorithms.
Fig. 5. Load the datasets
Stage 3: Check the type of the dataset
After initialize the data file with the help of syntax
check the type of dataset. By using dataset accuracy is
calculate of classification algorithms. Figure 6. represent
the syntax which is used to declare type of datasets.
Fig. 6. Type the datasets
Stage 4: Check the Shape of the data
After initialize the data file with the help of syntax check
the shape or size of dataset. By using dataset Cardiology
Institute comparison of machine learning classification
algorithm has to be performed. Figure 7. represent the
syntax which is used to declare shape of datasets.
Fig. 7. Shape of the datasets
Stage 5: Dataset description
After declare shape and type of dataset finally in this
stage, datasets are found in detail form i.e., age, sex,
target, slope, cp, fbs, etc. Then datasets is applied to
classification algorithm for analysis the accuracy for
disease prediction purpose. Figure 8. represent the syntax
which is used to declare datasets in detail.
International Journal of Intelligent Systems and Applications in Engineering
IJISAE, 2023, 11(2s), 165173 | 170
Figure 8. Dataset in detailed form
Stage 7: Check for missing Data
After getting data in describe form check wheatear any
kind of data is missed at the time of declaration. Below
Figure 9. Represent syntax which is used to check data is
missing or not.
Figure 9. data is missing or not.
Stage 8: Check the correlation with target data
After getting data in describe form check data is
correlated with our target or not . Below Figure 10.
Represent syntax which is used to check data is
correlated.
4. Results and Discussions
Fig. 10. data is corelated with target
purposed of applying algorithm to predict the disease in
As per discussion in Section III, to meet our objective
the Cardiology Institute datasets is used which taken
Hungary University. After declare or initializing
datasets in describe form apply dataset on some machine
learning classification algorithm they are KNN, Decision
Tree Classifier and Random Forest etc. The main
human body i.e., blood pressure, cholesterol, pulse rate,
etc. Figure 8. Shows the comparison graph of
classification algorithm on the basis of accuracy
parameter. After observation of Figure 8. it assumed
average prediction accuracy probability 86.48% is
obtained.
International Journal of Intelligent Systems and Applications in Engineering
IJISAE, 2023, 11(2s), 165173 | 171
5. Conclusion
Fig. 8 Accuracy Scores of machine learning algorithm
retraining.
The general target of our task is to foresee precisely with
less number of tests and characteristics the nearness of
coronary illness. In this task, fourteen properties are
viewed as which structure the essential reason for tests
and give exact outcomes pretty much. A lot more info
properties can be taken however we will likely anticipate
with less number of credits and quicker effectiveness to
foresee the danger of having coronary illness at a
specific age range. Five information mining order
methods were applied to be specific K-Closest Neighbor,
Innocent Bayes, Choice Tree, Irregular Woodland and
Calculated Relapse. It is demonstrated that Arbitrary
Timberland has preferable exactness over different
systems.
This is the best model to anticipate patients with
coronary illness. This undertaking could answer complex
questions, each with its own quality effortlessly of model
understanding, access to nitty gritty data and precision.
This undertaking can be additionally improved and
extended. For instance, it can fuse other clinical traits
other than the 14 qualities we utilized. It can likewise
join other information mining systems, e.g., Time
Arrangement, Bunching and Affiliation Rules. Constant
information can likewise be utilized rather than simply
all out information. Another region is to utilize Content
Mining to mine the immense measure of unstructured
information accessible. This undertaking is introduced
utilizing information mining procedures. From calculated
relapse, KNN, Innocent Bayes, Choice Tree, Irregular
timberland are utilized to build up the framework.
Arbitrary Timberland demonstrates the better outcomes
and helps the area specialists and even the individual
identified with the clinical field to get ready for a
superior and early analysis for the patient. This
framework performs reasonably well even without
References
[1]
S. F. Dessai, “Intelligent Heart Disease Prediction
System Using Probabilistic Neural Network,” no. 5,
pp. 3844, 2013.
[2]
E. Y. and C. Kilikcier, “Determination of Patient
State from Cardiotocogram using LSSVM with
Particle Swarm Optimization and Binary Decision
Tree,” Master Thesis, Dep. Electr. Electron. Eng.,
no. Uludag, 20.
[3]
N. S. and D. Singh, “Performance Evaluation of K-
Means and Hierarchal Clustering in Terms of
Accuracy and Running Time,” Dep. Comput. Sci.
Eng. Barkatullah Univ. Inst. Technol., no. Ph.D
Dissertation, 2
[4]
I. S. F. Dessai, “Intelligent Heart Disease Prediction
System Using Probabilistic Neural Network,” no. 5,
pp. 3844, 2013.
[5]
T. Karayilan and Ö. Kiliç, “Prediction of Heart
disease using neural network,” in 2nd International
Conference on Computer Science and Engineering,
UBMK 2017, 2017, pp. 719723.
[6]
M. Mardiyono, R. Suryanita, and A. Adnan,
“Intelligent Monitoring System on Prediction of
Building Damage Index using Neural-Network,”
TELKOMNIKA (Telecommunication Comput.
Electron. Control., vol. 10, no. 1, p. 155, 2015
[7]
N. Guru, A. Dahiya, and N. Rajpal, “Decision
support system for heart disease diagnosis using
Neural Network,” 2007.
[8]
J. S. Singh Navdeep, “No Title,” Intell. Hear. Dis.
Predict. Syst. using CANFIS Genet. Algorithm, Int.
J. Biol. Med. Sci., no. International Journal of
Advance Research, Ideas and Innovations in
Technology© 2018, www.IJARIIT.comAll Rights,
p. Reserved Page | 987, 2008.
100.00%
90.00%
84.25%
86.89%
81.96%
84.25%
80.00%
70.00%
60.00%
50.00%
40.00%
30.00%
20.00%
10.00%
0.00%
68.85%
KNN
Decision tree Logistic Naïve bayes Random
regression Forest
ACCURACY
International Journal of Intelligent Systems and Applications in Engineering
IJISAE, 2023, 11(2s), 165173 | 172
[9]
R. G. S. Rajkumar Asha, “No Title,” Diagnosis
Hear. Dis. Using Datamining Algorithm, vol. Issue
10 V, no. Global Journal of Computer Science and
Technology, p. Page 38, 20
[10]
S. Radhimeenakshi and G. M. Nasira, Prediction
of Heart Disease using Neural Network with Back
Propagation,” Int. J. Data Min. Tech. Appl., vol. 4,
no. 1, pp. 19 22, 2016.
[11]
“Prediction of Heart Disease using Artificial
Neural Network,” VFAST Trans. Softw. Eng., pp.
102112, 2019.
[12]
Halaudi Daniel M., “Prediction of heart disease
using classification algorithms.,” WCSECS, pp.
2224, 2014
[13]
G. S. Kumari Milan, “No Title,” Comp. Study Data
Min. Classif. Methods Cardiovasc. Dis. Predict.,
vol. Vol. 2, no. IJCST Vol. 2, Iss ue2, June 2011,
2011
[14]
Z. M. A. Mehta Rupa G. ,Rana Dipti P., “No Title,”
A Nov. Fuzzy Based Classif. Data Min. using
Fuzzy Discret., no. World Congress on Computer
Science and Information, 2008.
[15]
X. Y. et Al., “Combination Data Mining Models
with New Medical Data to Predict Outcome of
Coronary Heart Disease,” Proc. Int. Conf. Converg.
Inf. Technol., pp. 868872, 2007.
[16]
Jankowski, J., Floege, J., Fliser, D., Boehm, M., &
Marx, N. (2021). Cardiovascular disease in chronic
kidney disease: pathophysiological insights and
therapeutic options. Circulation, 143(11), 1157-
1172
[17]
Eckel, R. H., Bornfeldt, K. E., & Goldberg, I. J.
(2021). Cardiovascular disease in diabetes, beyond
glucose. Cell Metabolism, 33(8), 1519-1545.
[18]
S. G. Manoj B, Kumar G, Ramesh G, “Emerging
risk factors for cardiovascular diseases: Indian
context.,” Indian J Endocrinol Metab, vol. 17, pp.
806814, 2013.
[19]
N. S. and D. Singh, “Performance Evaluation of K-
Means and Hierarchal Clustering in Terms of
Accuracy and Running Time,” Dep. Comput. Sci.
Eng. Barkatullah Univ. Inst. Technol., no. Ph.D
Dissertation, 2012
[20]
A. A. Shinde, S. N. Kale, R. M. Samant, A. S.
Naik, and S. A. Ghorpade, “Heart Disease
Prediction System using Multilayered Feed
Forward Neural Network and Back Propagation
Neural Network,” Int. J. Comput. Appl., vol. 166,
no. 7, pp. 975 8887, 2
[21]
M. C. and P. M. Franck Le Duff,
CristianMunteanb, “Predicting Survival Causes
After Out of Hospital Cardiac Arrest using Data
Mining Method,” Stud. Health Technol. Inform.,
vol. Vol. 107, no. 2, p. No. 2.
[22]
Chaudhary, A., & Garg, P. (2014). Detecting and
diagnosing a disease by patient monitoring system.
International Journal of Mechanical Engineering
And Information Technology, 2(6), 493-499.
[23]
Garg, P.,
Malik,
K.,
Raheja,
N.,
&
Garg, P. (2011).
Enhanced FP-growth algorithm.
International
Journal of Computational Engineering
and
Management, 12, 54-56.
[24]
P. Garg, A. Dixit and P. Sethi, "Ml-fresh: novel
routing protocol in opportunistic networks using
machine learning," Computer Systems Science and
Engineering, vol. 40, no.2, pp. 703717, 2022.
[25]
Yadav, P. S., Khan, S., Singh, Y. V., Garg, P., &
Singh, R. S. (2022). A Lightweight Deep Learning-
Based Approach for Jazz Music Generation in
MIDI Format. Computational Intelligence and
Neuroscience, 2022.
[26]
Soni, E., Nagpal, A., Garg, P., & Pinheiro, P. R.
(2022). Assessment of Compressed and
Decompressed ECG Databases for Telecardiology
Applying a Convolution Neural Network.
Electronics, 11(17), 2708.
[27]
Chauhan, S., Singh, M., & Garg, P. (2021). Rapid
Forecasting of Pandemic Outbreak Using Machine
Learning. Enabling Healthcare 4.0 for Pandemics:
A Roadmap Using AI, Machine Learning, IoT and
Cognitive Technologies, 59-73.
[28]
Gupta, S., & Garg, P. (2021). An insight review on
multimedia forensics technology. Cyber Crime and
Forensic Computing: Modern Principles, Practices,
and Algorithms, 11, 27.
[29]
Shrivastava, P., Agarwal, P., Sharma, K., & Garg,
P. (2021). Data leakage detection in Wi-Fi
networks. Cyber Crime and Forensic Computing:
Modern Principles, Practices, and Algorithms, 11,
215.
[30]
Pustokhina, I. V., Pustokhin, D. A., Lydia, E. L.,
Garg, P., Kadian, A., & Shankar, K. (2021).
Hyperparameter search based convolution neural
network with Bi-LSTM model for intrusion
detection system in multimedia big data
environment. Multimedia Tools and Applications,
1-18.
[31]
Khanna, A., Rani, P., Garg, P., Singh, P. K., &
Khamparia, A. (2021). An Enhanced Crow Search
Inspired Feature Selection Technique for Intrusion
Detection Based Wireless Network System.
Wireless Personal Communications, 1-18.
[32]
Meenakshi, P. G., & Shrivastava, P. (2021).
Machine learning for mobile malware analysis.
Cyber Crime and Forensic Computing: Modern
Principles, Practices, and Algorithms, 11, 151.
[33]
Garg, P., Pranav, S., & Prerna, A. (2021). Green
Internet of Things (G-IoT): A Solution for
International Journal of Intelligent Systems and Applications in Engineering
IJISAE, 2023, 11(2s), 165173 | 173
Sustainable Technological Development. In Green
Internet of Things for Smart Cities (pp. 23-46).
CRC Press.
[34]
Nanwal, J., Garg, P., Sethi, P., & Dixit, A. (2021).
Green IoT and Big Data: Succeeding towards
Building Smart Cities. In Green Internet of Things
for Smart Cities (pp. 83-98). CRC Press.
[35]
Garg, P., Dixit, A., & Sethi, P. (2021, May). Link
Prediction Techniques for Opportunistic Networks
using Machine Learning. In Proceedings of the
International Conference on Innovative Computing
& Communication (ICICC).
[36]
Beniwal, S., Saini, U., Garg, P., & Joon, R. K.
(2021). Improving performance during camera
surveillance by integration of edge detection in IoT
system. International Journal of E-Health and
Medical Communications (IJEHMC), 12(5), 84-96.
[37]
Garg, P., Dixit, A., & Sethi, P. (2021, April).
Opportunistic networks: Protocols, applications &
simulation trends. In Proceedings of the
International Conference on Innovative Computing
& Communication (ICICC).
[38]
Garg, P., Dixit, A., & Sethi, P. (2021). Performance
comparison of fresh and spray & wait protocol
through one simulator. IT in Industry, 9(2).
[39]
Gupta, M., Garg, P., & Agarwal, P. (2021). Ant
Colony Optimization Technique in Soft
Computational Data Research for NP-Hard
Problems. In Artificial Intelligence for a
Sustainable Industry 4.0 (pp. 197-211). Springer,
Cham.
[40]
Malik, M., Singh, Y., Garg, P., & Gupta, S. (2020).
Deep Learning in Healthcare system. International
Journal of Grid and Distributed Computing, 13(2),
469-468.
[41]
Gupta, M., Garg, P., Gupta, S., & Joon, R. (2020).
A Novel Approach for Malicious Node Detection in
Cluster-Head Gateway Switching Routing in
Mobile Ad Hoc Networks. International Journal of
Future Generation Communication and
Networking, 13(4), 99-111.
[42]
Garg, P., Dixit, A., Sethi, P., & Pinheiro, P. R.
(2020). Impact of node density on the qos
parameters of routing protocols in opportunistic
networks for smart spaces. Mobile Information
Systems, 2020.
[43]
Gupta, A., Garg, P., & Sonal, Y. S. (2020). Edge
Detection Based 3D Biometric System for Security
of Web-Based Payment and Task Management
Application. International Journal of Grid and
Distributed Computing, 13(1), 2064-2076.
[44]
Dixit, A., Garg, P., Sethi, P., & Singh, Y. (2020,
April). TVCCCS: Television Viewer’s Channel
Cost Calculation System On Per Second Usage. In
IOP Conference Series: Materials Science and
Engineering (Vol. 804, No. 1, p. 012046). IOP
Publishing.
[45]
Sethi, P., Garg, P., Dixit, A., & Singh, Y. (2020,
April). Smart number crunchera voice based
calculator. In IOP Conference Series: Materials
Science and Engineering (Vol. 804, No. 1, p.
012041). IOP Publishing.
[46]
S. Rai, V. Choubey, Suryansh and P. Garg, "A
Systematic Review of Encryption and Keylogging
for Computer System Security," 2022 Fifth
International Conference on Computational
Intelligence and Communication Technologies
(CCICT), 2022, pp. 157-163, doi:
10.1109/CCiCT56684.2022.00039.
[47]
L. Saraswat, L. Mohanty, P. Garg and S. Lamba,
"Plant Disease Identification Using Plant Images,"
2022 Fifth International Conference on
Computational Intelligence and Communication
Technologies (CCICT), 2022, pp. 79-82, doi:
10.1109/CCiCT56684.2022.
... As reported by the International Diabetes Federation (IDF), India has experienced a rapid increase in the occurrence of diabetes, making it one of the countries with the highest number of diabetes cases globally. Another study estimated that the presence of diabetes in India among adults aged 20-79 years was approximately 8.9% in 2019, accounting for around 77 million individuals [2] [29][30][31][32][33][34][35][36][37]. This prevalence is expected to rise to 9.9% by 2030, with an estimated 101 million individuals affected. ...
Article
Full-text available
The purpose of this paper is to explore the effectiveness of automated detection methods in diagnosing diabetic retinopathy (DR), a leading cause of vision loss among individuals with diabetes. By leveraging advancements in artificial intelligence and image processing techniques, the study aims to assess the accuracy and efficiency of automated systems in identifying retinopathy, thus enabling early intervention and improved patient outcomes. A comprehensive review of existing literature on automated detection systems for DR was conducted. Various image analysis algorithms, including deep learning approaches and feature extraction techniques, were explored and evaluated based on their performance in detecting retinal abnormalities associated with DR. In this research, we present an Inception-v3 and DenseNet-based automated detection technique for DR using retinal fundus pictures. This work involves the training, evaluation, and comparison of the performance of DenseNet and Inception-v3 convolutional neural networks (CNN) on a publicly available dataset of retinal fundus images. Inception-v3-based classifiers have performed better than DenseNet-based classifiers with the same dataset. While DenseNet achieved classifier accuracy and precision of 89.2% and 89.6%, respectively, Inception-v3 has been able to achieve classifier accuracy of 95.8% and precision of 95.9%. Inception-v3 has also exceeded area under ROC in comparison to DenseNet by 0.3% in two categories. The findings of this study highlight the promising potential of automated detection methods for DR. The integration of automated systems in clinical settings has the potential to enhance early diagnosis, facilitate timely treatment interventions, and improve patient outcomes.
... Numerous documents demonstrate the forecasting of hazard issues for these diseases. From the survey of examined examine papers, it could be assumed that the use of DM methods for diseases like dementia, schizophrenia, and depression can greatly improve patients' clinical results, prognosis and quality of life [44] [45]. ...
Article
Mental health prediction is one of the most necessary parts of decreasing the probability of severe mental illness. In the meantime, mental health prediction could present a hypothetical base for the Department of Public Health to work out mental interference tactics for students. This paper intends to forecast students’ mental health using Artificial Intelligence (AI). This paper uses the Survey Student Responses dataset from the Kaggle repository, 19 factors of 1182 students of different age groups from different educational institutions in Delhi National Capital Region (NCR) through a cross-sectional survey, with the outcomes of the Self-reporting Inventory, was used to distinguish mental health. This paper proposes a new forecasting technique using the Mamdani Fuzzy Inference System based on the Min-Max Method (for data labelling) and Pearson’s correlation coefficient (for feature selection), which could choose and order the very significant features that impact the student’s mental health. In addition, we utilize Multinomial Logistic Regression (MLR) and Multilayer Perceptron (MLP) (for ML) algorithm and the Dl4jMlpClassifier (for DL) algorithm to forecast the mental health of students. The outcomes demonstrate that the prediction accuracy of the proposed technique is high, which is superior to the previous algorithms. Therefore, this technique could be used to forecast the student’s mental health efficiently.
... The Intrusion Detection Systems, which examine network activity and spot malicious node behavior, are also used to defend against network attacks [7]. Due to typical IDS systems' high resource consumption and inadequacy, lightweight intrusion detection systems are crucial for networks when devices have limited resources, since they are better able to analyze and identify malicious activities [8]. ...
... The Intrusion Detection Systems, which examine network activity and spot malicious node behavior, are also used to defend against network attacks [7]. Due to typical IDS systems' high resource consumption and inadequacy, lightweight intrusion detection systems are crucial for networks when devices have limited resources, since they are better able to analyze and identify malicious activities [8]. ...
Article
The routing process in the Internet of Things (IoT) presents challenges in industrial applications due to its complexity, involving multiple devices, critical decision-making, and accurate data transmission. The complexity further increases with dynamic IoT devices, which creates opportunities for potential intruders to disrupt routing. Traditional security measures are inadequate for IoT devices with limited battery capabilities. Although RPL (Routing Protocol for Low Energy and Lossy Networks) is commonly used for IoT routing, it remains vulnerable to security threats. This study aims to detect and isolate three routing attacks on RPL: Rank, Sybil, and Wormhole. To achieve this, a lightweight trust-based secured routing system is proposed, utilizing machine learning techniques to derive values for devices in new networks, where initial trust values are unavailable. The system demonstrates successful detection and isolation of attacks, achieving an accuracy of 98.59%, precision of 98%, recall of 99%, and f-score of 98%, thereby reinforcing its effectiveness. Attacker nodes are identified and promptly disabled, ensuring a secure routing environment. Validation on a generated dataset further confirms the reliability of the system.
... Contemporary literature contributes the researched solutions for the discussing issue: [2], presents the use of the adaptive sensing range concept to deplete energy consumption while expanding WSNs lifespan [3], contributes a centralized solution that resolves the WSN power dearth through scheduling the nodes deployment between active and passive nodes [4], explores an algorithm of a centralized energy conserving scheduling through building max joint sets and later specifying active time period to every joint set [5], introduces the issue of CSC that aims to identify max set covers ensuring the activation of each set various time intervals to preserve power [6], proposes a greedy heuristic which performs the sensors prioritization depending on unconsumed energy of sensors [7], contributes conserving energy directional sensors [8], presents the collaboration of mobile sensors with static sensors [9], introduces failure probability theory of the target coverage issues for expanding system steadfastness along with a greedy algorithm whichcomputes the require number of MRSC efficiently [10], recommends a DOCAthat partitions the big network as several h-hop local networks. ...
Article
The sensors nearby the static sink drains their energy resources rapidly, since they continuously involve to build routes in Wireless sensor networks, which are between data sources and static sink. Hence, the sensors nearby the sink having limited lifespan, which axing the network lifetime.The mobile-sink strategy that allows the sink to move around the network area to distribute the transmission overhead to multiple sensor nodes. However, the mobile-sink strategy is often tall ordered practice due to the continuous need of establishing routes between source nodes and the mobile sink (MS) at new position occurred due to its random mobility. In regard to above stated argument, this manuscript proposed a novel energy data transmission strategy which is effective for WSN with mobile sink. Unlike the traditional contributions, which relies on mobile sink with random mobility strategies, the proposal defines a discerning path for mobile sink routing between sectioned clusters of the WSN. The proposal of the manuscript titled “Mobile Sink Node with Discerning Motility Approach (MSDMA) for Energy Efficient Data Communication over WBAN”. The method defined in proposed model sections the target network in to multiple geographical clusters and prioritize these clusters by the delay sensitivity of the data transmitted by the sensor nodes of the corresponding clusters. Further, discriminating these clusters by their delay sensitive priority to define mobile sink route. For estimation of the delay sensitive priority of the clusters, set of metrics are proposed. The experimental study carried on simulation to assess the significance of the suggested method. The performance improvement of the suggested method is ascended through comparative analysis performed against benchmark model under divergent metrics.
Article
Full-text available
This research begins an in-depth examination of IoT-enabled energy management systems at a time when IoT (Internet of Things) technology has a profoundly revolutionary impact. Finding the fundamental sustainable energy storage characteristics that support their operational effectiveness and environmental sustainability is its main goal. By taking a comprehensive approach, the paper carefully analyzes the existing IoT-based systems, exploring their complex architectural features, real-world uses, and related difficulties. Parallel to that, a thorough literature study is conducted, highlighting the crucial aspects of sustainable energy storage and their inherent significance in energy management systems. The results of this in-depth analysis unequivocally demonstrate how crucial these factors are for improving the effectiveness, performance, and ecological soundness of energy management systems. While highlighting the current environment and key variables, it is important to recognize the research's constraints, which are confined to an analysis of existing IoT-based energy management systems and a literature study. The design and implementation of IoT-driven energy management systems infused with the indicated sustainable energy storage characteristics are anticipated to be included in further research projects. The investigation of practical application, scalability, and a dedication to keeping up with the rapidly changing technology and practices that characterize this dynamic sector would be some of these objectives.
Article
Health Monitoring System Models (HMSMs) need speed, efficiency, and security to work. Cascading components ensure data collection, storage, communication, retrieval, and privacy in these models. Researchers propose many methods to design such models, varying in scalability, multidomain efficiency, flexibility, usage and deployment, computational complexity, cost of deployment, security level, feature usability, and other performance metrics. Thus, HMSM designers struggle to find the best models for their application-specific deployments. They must test and validate different models, which increases design time and cost, affecting deployment feasibility. This article discusses secure HMSMs' application-specific advantages, feature-specific limitations, context-specific nuances, and deployment-specific future research scopes to reduce model selection ambiguity. The models based on the Internet of Things (IoT), Machine Learning Models (MLMs), Blockchain Models, Hashing Methods, Encryption Methods, Distributed Computing Configurations, and Bioinspired Models have better Quality of Service (QoS) and security than their counterparts. Researchers can find application-specific models. This article compares the above models in deployment cost, attack mitigation performance, scalability, computational complexity, and monitoring applicability. This comparative analysis helps readers choose HMSMs for context-specific application deployments. This article also devises performance measuring metrics called Health Monitoring Model Metrics (HM3) to compare the performance of various models based on accuracy, precision, delay, scalability, computational complexity, energy consumption, and security.
Conference Paper
Full-text available
Encryption encrypts data so that the one with a password or encryption key may access it. Encryption protects data content rather than preventing unlawful data transmission interception or access. Intelligence and security organizations utilize it, as well as personal security software that protects user data. Advanced Encryption Standard (AES) is one of the symmetric encryption algorithms that allows both parties, sender and receiver, to use the same key to encrypt and decrypt data. The suggested A keylogger, sometimes known as a keystroke logger, is a program that records or logs the keys you press on your console, usually invisibly so you are unaware that your activities are being monitored. Most people only perceive the negative aspects of this software, yet it has legitimate uses as well. Apart from being used for vengeful purposes such as obtaining information and other private information for vindictive purposes, it can also be used in the office to monitor your employees, at home to monitor your children's activities, and by law enforcement to investigate and follow occurrences involving the use of computers. The project will be entirely written in Python, with the exception of the pynput module, which is not a common Python module and must be installed. The software we're going to make should keep track of keystrokes and save the results to a file.
Article
Full-text available
Incalculable numbers of patients in hospitals as a result of COVID-19 made the screening of heart patients arduous. Patients who need regular heart monitoring were affected the most. Telecardiology is used for regular remote heart monitoring of such patients. However, the resultant huge electrocardiogram (ECG) data obtained through regular monitoring affects available storage space and transmission bandwidth. These signals can take less space if stored or sent in a compressed form. To recover them at the receiver end, they are decompressed. We have combined telecardiology with automatic ECG arrhythmia classification using CNN and proposed an algorithm named TELecardiology using a Deep Convolution Neural Network (TELDCNN). Discrete cosine transform (DCT), 16-bit quantization, and run length encoding (RLE) were used for compression, and a convolution neural network (CNN) was applied for classification. The database was formed by combining real-time signals (taken from a designed ECG device) with an online database from Physionet. Four kinds of databases were considered and classified. The attained compression ratio was 2.56, and the classification accuracies for compressed and decompressed databases were 0.966 and 0.990, respectively. Comparing the classification performance of compressed and decompressed databases shows that the decompressed signals can classify the arrhythmias more appropriately than their compressed-only form, although at the cost of increased computational time.
Article
Full-text available
In today’s real-world, estimation of the level of difficulty of the musical is part of very meaningful musical learning. A musical learner cannot learn without a defined precise estimation. This problem is not very basic but it is complicated up to some extent because of the subjectivity of the contents and the scarcity of the data. In this paper, a lightweight model that generates original music content using deep learning along with generating music based on a specific genre is proposed. The paper discusses a lightweight deep learning-based approach for jazz music generation in MIDI format. In this work, the genre of music chosen is Jazz, and the songs selected are classical numbers composed by various artists. All the songs are in MIDI format and there might be differences in the pace or tone of the music. It is prudential to make sure that the chosen datasets that do not have these kinds of differences and are similar to the final output as desired. A model is trained to take in a part of a music file as input and should produce its continuation. The result generated should be similar to the dataset given as the input. Moreover, the proposed model also generates music using a particular instrument.
Chapter
Full-text available
On recollecting past, in 1990, a new trend was started in the area of designing the consumer electronics, household appliances and various other consumer products used widely. A new term machine intelligence quotient (MIQ) also came into being which marks the increase in all these consumer products as compared to before 1990. And as the technology rises and more intelligent systems came into being, products such as microwaves and washing machines came which focuses on some particular tasks assigned to them; they prove that machines can make intelligent decisions and also learn from their experience. There are numerous factors which causes the increase in MIQ. Zadeh (1996) studied that most important factor affecting in soft computing or can be called as fuzzy logic which enables the machine to mimic as humans approximately. Some factors which caused the increase in high MIQ are based on the observations such as F.L. Smidth cement kiln, and the Sendai system was designed by the very renowned company Hitachi which made a groundwork for the fuzzy logic for designing and production of increase in MIQ products [1]. Another product which a shower head controlled by fuzzy logic was made in 1987 by Matsushita; they also made fuzzy controlled washing machine in 1989.
Chapter
Full-text available
Humans have faced a number of pandemics since the dawn of civilization, but today what we are facing is an invisible enemy novel COVID-19, causing the pandemic globally at an alarming rate, bringing a devastating effect on our lives and impacting our economy drastically. The infection in humans by COVID-19 was thought to be originally from bats perhaps as zoonotic agent (from animal to human) but the rapid increase in the figure of cases in Wuhan city and globally even after shutting the market off and quarantine whole city, indicated an alternative mode of transmission from human-to-human which is rarely observed in nature. The main objective of this chapter is to predict a rapid forecasting of pandemic outbreak using machine learning approaches. The chapter is based on a preliminary estimation about the disease, spread of disease across the globe, the possible ways of treatment, and prevention in its outbreak which makes use of technologies like machine learning which may prove beneficial to save the human race from pandemics like COVID19 in the future.
Article
Full-text available
Opportunistic Networks (OppNets) is gaining popularity day-by-day due to their various applications in the real-life world. The two major reasons for its popularity are its suitability to be established without any requirement of additional infrastructure and the ability to tolerate long delays during data communication. Opportunistic Network is also considered as a descendant of Mobile Ad hoc Networks (Manets) and Wireless Sensor Networks (WSNs), therefore, it inherits most of the traits from both mentioned networking techniques. Apart from its popularity, Opportunistic Networks are also starting to face challenges nowadays to comply with the emerging issues of the large size of data to be communicated and blind forwarding of data among participating nodes in the network. These issues lower the overall performance of the network. Keeping this thing in mind, ML-Fresh-a novel framework has been proposed in this paper which focuses to overcome the issue of blind forwarding of data by maintaining an optimum path between any pair of participating nodes available in the OppNet using machine learning techniques viz. pattern prediction, decision tree prediction, adamic-adar method for complex networks. Apart from this, ML-Fresh also uses the history of successful encounters between a pair of communicating nodes for route prediction in the background. Simulation results prove that the ML-Fresh outperforms the existing framework of Opportunistic Networks on the grounds of standard Quality-of-Service (QoS) parameters.
Article
Full-text available
In recent years, there is an exponential increase in the growth of the multimedia data, which is being generated from zettabyte to petabyte scale. At the same time, security issues in networks, Internets and organizations are also continues to increase. The process of finding intrusions in such a big data environment is not easier. Different types of intrusion-detection system (IDS) have been presented for diverse kinds of networking attacks, however, many models could be identified unknown attacks. Deep learning (DL) approaches lately employed to large-scale big data analysis for effectual outcome. In this view, this paper presents a new deep learning based hyperparameter search (HPS) convolutional neural network with Bi-directional long short term memory (CBL) model called HPS-CBL for intrusion detection in big data environment. The HPS-CBL model make use of CBL technique for the identification of intrusions in the network. Since the proper tuning of hyperparameters of the CBL network is highly important, the proposed model uses improved genetic algorithm (IGA) for hyperparameter tuning. The proposed HPS-CBL is validated using a UNSW-NB15 dataset and the results are validated under diverse evaluation parameters. The obtained experimental outcome clearly stated the superior nature of the HPS-CBL model over the compared methods by attaining a maximum precision of 99.24%, recall of 98.69%, F-score of 98.97% and accuracy of 98.18% respectively.
Article
Full-text available
Recent development of cognitive computing driven evolutionary techniques improve the overall quality of service and user experience in wireless communication network. This Paper consists of a feature selection method based on improvement of Crow Search Algorithm which has been used in Intrusion Detection System to limit the size of the dataset with which the system is working with and getting better results. Since IDS deals with a large data, the crucial task of IDS is to keep efficient features which represents the whole data and there is no duplicity and irrelevancy. The previous model that was proposed used the crow search algorithm in the intrusion detection system (CSA-IDS) as a model to find the optimal feature’s subset and random forest as a judgement on features that are produced by the CSA-IDS. The KDD and UNSW datasets are used to evaluate the earlier proposed model. The proposed model achieved an accuracy of 99.84% for attack detection using UNSW datasets. Similarly, R2L and U2R attacks have detected accuracy of 99.97% for NSL-KDD dataset. The development of proposed model improve the overall communication services and feature selection in wireless communication network. The outcome proves that the subset of features that are obtained by using CSA-IDS fetches higher accuracy rate using a smaller number of features.
Chapter
Mobile devices are becoming more and more attached part to majority of human’s lives, substituting computers for the use of Internet by permitting operators to run through emails, reach banking services online, use social media at fastest ever speed through WhatsApp, Facebook, Instagram, Linkedin, Twitter, etc. Likewise, the fast emergent attractive and supportive applications in mobile devices with irresistible experience, for example GPS mapping and various other delivery and taxi apps using GPS for locational updates, payment transfer, personal valet generation like Dominos, OLA, Uber, Swiggy, Zomato etc., make mobiles extra likable and engaging to users. During consistent and repetitive utilization of mobiles, confidential and sensitive data like banking passwords, debit card, credit cards, contact details, further personal data remains stored on most of the mobile devices. Considering this set up as a base and an opportunity, now complete hacker industry has twisted their entire attentiveness towards mobile devices, where there lies plenty of potential to achieve ample of their wished data. Existing safety software offers limited solutions against these threats and hence proving incapable in maintaining speed and delivering results w.r.t express advancement in malware industry. Hackers plan implantation of various malicious software variants like virus or spyware. Malware is a specific code developed by cyber attackers and it acts as a shorthand of malicious software. It is aimed to create broad mutilation to system, software and data in order to achieve unsanctioned admittance in the network. The easiest and prevalent means of delivering malware in a mobile set is in the form of a file, link, email or unauthorized websites. ML has already started advancement in malware detection by utilizing several types of networks, data on host and several other anti-malware components. During detection of malware, a formerly unnoticed sample can be a fresh file. Its secreted stuff can be malware (malign) or benign (legitimate). ML follows wide range of methods to identify malware instead of a solo technique. These methods have various abilities and diverse responsibilities which they suit superlatively. Hence, ML may be termed as an exemplar that refer to learning from past experience (that in our case is former mobile data) to advance forthcoming enactment. The solitary emphasis of this field is spontaneous learning techniques. Learning means alteration or upgrading of algorithm automatically based on previous “experiences” deprived of any outside support from human. As on date ML seems to be the best tool which is sharpening itself on its own in order to counter serious and new threats of malware in mobile devices. Hence based on rapid learning ML helps in avoiding similar nature malware attacks and also reacts to varying behavior. In this work compilation, learning and examining various types of malwares prevalent in mobile industry, different malware recognition or detection methods/techniques being used for mobiles OS, are being undertaken. Analyzation of every technique briefing its benefits and merits is covered. An organized and inclusive gestalt of progression of malware detection techniques on the basis of ML and latest study on ML for mobile malware analysis is presented.